[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] xen: Support 64-bit PV guest receiving NMIs




On 07/19/2013 11:51 AM, Konrad Rzeszutek Wilk wrote:
> Zhenzhong Duan sent a patch that adds some of this functionality
> but this code adds the remaining pieces. The kernel has the
> logic to handle Xen-type-exceptions using the paravirt interface
> in the assembler code (see PARAVIRT_ADJUST_EXCEPTION_FRAME -
> pv_irq_ops.adjust_exception_frame and and INTERRUPT_RETURN -
> pv_cpu_ops.iret).
> 
> That means the nmi handler (and other exception handlers) use
> the hypervisor iret.
> 
> The other changes that would be neccessary for this would
> be to translate the NMI_VECTOR to one of the entries on the
> ipi_vector and make xen_send_IPI_mask_allbutself use different
> events.
> 
> Fortunately for us commit 1db01b4903639fcfaec213701a494fe3fb2c490b
> (xen: Clean up apic ipi interface) implemented this and we piggyback
> on the cleanup such that the apic IPI interface will pass the right
> vector value for NMI.
> 
> With this patch we can trigger NMIs within a PV guest (only tested
> x86_64).
> 
> SysRq : Show backtrace of all active CPUs
> sending NMI to all CPUs:
> NMI backtrace for cpu 2
> CPU 2
> RIP: e030:[<ffffffff8100130a>]  [<ffffffff8100130a>] 
> xen_hypercall_vcpu_op+0xa/0x20
> . snip..
> Call Trace:
>  [<ffffffff813afdc0>] ? xen_send_IPI_one+0x40/0x60
>  [<ffffffff8104bdcb>] __xen_send_IPI_mask+0x2b/0x50
>  [<ffffffff8104c6f9>] xen_send_IPI_all+0x79/0xa0
>  [<ffffffff81074df9>] arch_trigger_all_cpu_backtrace+0x59/0xa0
>  [<ffffffff813d16f9>] sysrq_handle_showallcpus+0x9/0x10
>  [<ffffffff813d1ad9>] __handle_sysrq+0x129/0x190
>  [<ffffffff813d1b40>] ? __handle_sysrq+0x190/0x190
>  [<ffffffff813d1ba4>] write_sysrq_trigger+0x64/0x70
>  [<ffffffff8121211b>] proc_reg_write+0x8b/0xe0
>  [<ffffffff811aa1c4>] vfs_write+0xb4/0x130
>  [<ffffffff811aa98a>] sys_write+0x5a/0xa0
>  [<ffffffff816825e9>] system_call_fastpath+0x16/0x1b
> NMI backtrace for cpu 0
> CPU 0
> . snip..
> Call Trace:
>  [<ffffffff81044180>] ? xen_safe_halt+0x10/0x20
>  [<ffffffff8105746c>] default_idle+0x3c/0x130
>  [<ffffffff81056cf9>] cpu_idle+0x99/0xe0
>  [<ffffffff816619da>] rest_init+0x8a/0xa0
>  [<ffffffff81ac10a4>] start_kernel+0x3da/0x3e7
>  [<ffffffff81ac0ae8>] ? repair_env_string+0x5b/0x5b
>  [<ffffffff81ac05f7>] x86_64_start_reservations+0x2a/0x2c
>  [<ffffffff81ac30ce>] xen_start_kernel+0x56e/0x570
> NMI backtrace for cpu 1
> CPU 1
> RIP: e030:[<ffffffff810013aa>]  [<ffffffff810013aa>] 
> xen_hypercall_sched_op+0xa/0x20
> .snip..
> Call Trace:
>  [<ffffffff81044180>] ? xen_safe_halt+0x10/0x20
>  [<ffffffff8105746c>] default_idle+0x3c/0x130
>  [<ffffffff81056cf9>] cpu_idle+0x99/0xe0
>  [<ffffffff81044969>] ? xen_irq_enable_direct_reloc+0x4/0x4
>  [<ffffffff8166801b>] cpu_bringup_and_idle+0xe/0x10
> NMI backtrace for cpu 3
> CPU 3
> .snip..
> Call Trace:
>  [<ffffffff81044180>] ? xen_safe_halt+0x10/0x20
>  [<ffffffff8105746c>] default_idle+0x3c/0x130
>  [<ffffffff81056cf9>] cpu_idle+0x99/0xe0
>  [<ffffffff81044969>] ? xen_irq_enable_direct_reloc+0x4/0x4
>  [<ffffffff8166801b>] cpu_bringup_and_idle+0xe/0x10
> 
> Incidentally that means kgdb will also now work within
> a PV guest without using the 'nokgdbroundup' workaround.
> 
> Note that the 32-bit version is different and this patch
> does not enable that.
> 
> CC: Lisa Nguyen <lisa@xxxxxxxxxxxxxxx>
> CC: Ben Guthro <benjamin.guthro@xxxxxxxxxx>
> CC: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxxx>
> Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>

Looks good to me.


Reviewed-by: Ben Guthro <benjamin.guthro@xxxxxxxxxx>

> ---
>  arch/x86/include/asm/xen/events.h |    1 +
>  arch/x86/xen/enlighten.c          |   13 ++++++++-----
>  arch/x86/xen/setup.c              |   13 +++++++++++--
>  arch/x86/xen/smp.c                |    5 +++++
>  drivers/xen/events.c              |   11 +++++++++++
>  include/xen/interface/vcpu.h      |    2 ++
>  6 files changed, 38 insertions(+), 7 deletions(-)
> 
> diff --git a/arch/x86/include/asm/xen/events.h 
> b/arch/x86/include/asm/xen/events.h
> index ca842f2..608a79d 100644
> --- a/arch/x86/include/asm/xen/events.h
> +++ b/arch/x86/include/asm/xen/events.h
> @@ -7,6 +7,7 @@ enum ipi_vector {
>       XEN_CALL_FUNCTION_SINGLE_VECTOR,
>       XEN_SPIN_UNLOCK_VECTOR,
>       XEN_IRQ_WORK_VECTOR,
> +     XEN_NMI_VECTOR,
>  
>       XEN_NR_IPIS,
>  };
> diff --git a/arch/x86/xen/enlighten.c b/arch/x86/xen/enlighten.c
> index 2fa02bc..231382a 100644
> --- a/arch/x86/xen/enlighten.c
> +++ b/arch/x86/xen/enlighten.c
> @@ -427,8 +427,7 @@ static void __init xen_init_cpuid_mask(void)
>  
>       if (!xen_initial_domain())
>               cpuid_leaf1_edx_mask &=
> -                     ~((1 << X86_FEATURE_APIC) |  /* disable local APIC */
> -                       (1 << X86_FEATURE_ACPI));  /* disable ACPI */
> +                     ~((1 << X86_FEATURE_ACPI));  /* disable ACPI */
>  
>       cpuid_leaf1_ecx_mask &= ~(1 << (X86_FEATURE_X2APIC % 32));
>  
> @@ -735,8 +734,7 @@ static int cvt_gate_to_trap(int vector, const gate_desc 
> *val,
>               addr = (unsigned long)xen_int3;
>       else if (addr == (unsigned long)stack_segment)
>               addr = (unsigned long)xen_stack_segment;
> -     else if (addr == (unsigned long)double_fault ||
> -              addr == (unsigned long)nmi) {
> +     else if (addr == (unsigned long)double_fault) {
>               /* Don't need to handle these */
>               return 0;
>  #ifdef CONFIG_X86_MCE
> @@ -747,7 +745,12 @@ static int cvt_gate_to_trap(int vector, const gate_desc 
> *val,
>                */
>               ;
>  #endif
> -     } else {
> +     } else if (addr == (unsigned long)nmi)
> +             /*
> +              * Use the native version as well.
> +              */
> +             ;
> +     else {
>               /* Some other trap using IST? */
>               if (WARN_ON(val->ist != 0))
>                       return 0;
> diff --git a/arch/x86/xen/setup.c b/arch/x86/xen/setup.c
> index 94eac5c..f78877c 100644
> --- a/arch/x86/xen/setup.c
> +++ b/arch/x86/xen/setup.c
> @@ -33,6 +33,9 @@
>  /* These are code, but not functions.  Defined in entry.S */
>  extern const char xen_hypervisor_callback[];
>  extern const char xen_failsafe_callback[];
> +#ifdef CONFIG_X86_64
> +extern const char nmi[];
> +#endif
>  extern void xen_sysenter_target(void);
>  extern void xen_syscall_target(void);
>  extern void xen_syscall32_target(void);
> @@ -525,7 +528,13 @@ void __cpuinit xen_enable_syscall(void)
>       }
>  #endif /* CONFIG_X86_64 */
>  }
> -
> +void __cpuinit xen_enable_nmi(void)
> +{
> +#ifdef CONFIG_X86_64
> +     if (register_callback(CALLBACKTYPE_nmi, nmi))
> +             BUG();
> +#endif
> +}
>  void __init xen_arch_setup(void)
>  {
>       xen_panic_handler_init();
> @@ -543,7 +552,7 @@ void __init xen_arch_setup(void)
>  
>       xen_enable_sysenter();
>       xen_enable_syscall();
> -
> +     xen_enable_nmi();
>  #ifdef CONFIG_ACPI
>       if (!(xen_start_info->flags & SIF_INITDOMAIN)) {
>               printk(KERN_INFO "ACPI in unprivileged domain disabled\n");
> diff --git a/arch/x86/xen/smp.c b/arch/x86/xen/smp.c
> index c1367b2..d792cce 100644
> --- a/arch/x86/xen/smp.c
> +++ b/arch/x86/xen/smp.c
> @@ -572,6 +572,10 @@ static inline int xen_map_vector(int vector)
>       case IRQ_WORK_VECTOR:
>               xen_vector = XEN_IRQ_WORK_VECTOR;
>               break;
> +     case NMI_VECTOR:
> +     case APIC_DM_NMI:
> +             xen_vector = XEN_NMI_VECTOR;
> +             break;
>       default:
>               xen_vector = -1;
>               printk(KERN_ERR "xen: vector 0x%x is not implemented\n",
> @@ -659,6 +663,7 @@ static irqreturn_t xen_irq_work_interrupt(int irq, void 
> *dev_id)
>       return IRQ_HANDLED;
>  }
>  
> +
>  static const struct smp_ops xen_smp_ops __initconst = {
>       .smp_prepare_boot_cpu = xen_smp_prepare_boot_cpu,
>       .smp_prepare_cpus = xen_smp_prepare_cpus,
> diff --git a/drivers/xen/events.c b/drivers/xen/events.c
> index a58ac43..419cc44 100644
> --- a/drivers/xen/events.c
> +++ b/drivers/xen/events.c
> @@ -56,6 +56,7 @@
>  #include <xen/interface/hvm/params.h>
>  #include <xen/interface/physdev.h>
>  #include <xen/interface/sched.h>
> +#include <xen/interface/vcpu.h>
>  #include <asm/hw_irq.h>
>  
>  /*
> @@ -1213,6 +1214,16 @@ EXPORT_SYMBOL_GPL(evtchn_put);
>  void xen_send_IPI_one(unsigned int cpu, enum ipi_vector vector)
>  {
>       int irq = per_cpu(ipi_to_irq, cpu)[vector];
> +
> +     /*
> +      * In which the IRQ will be -1.
> +      */
> +     if (unlikely(vector == XEN_NMI_VECTOR)) {
> +             int rc =  HYPERVISOR_vcpu_op(VCPUOP_send_nmi, cpu, NULL);
> +             if (rc < 0)
> +                     printk(KERN_WARNING "Sending nmi to CPU%d failed 
> (rc:%d)\n", cpu, rc);
> +             return;
> +     }
>       BUG_ON(irq < 0);
>       notify_remote_via_irq(irq);
>  }
> diff --git a/include/xen/interface/vcpu.h b/include/xen/interface/vcpu.h
> index 87e6f8a..b05288c 100644
> --- a/include/xen/interface/vcpu.h
> +++ b/include/xen/interface/vcpu.h
> @@ -170,4 +170,6 @@ struct vcpu_register_vcpu_info {
>  };
>  DEFINE_GUEST_HANDLE_STRUCT(vcpu_register_vcpu_info);
>  
> +/* Send an NMI to the specified VCPU. @extra_arg == NULL. */
> +#define VCPUOP_send_nmi             11
>  #endif /* __XEN_PUBLIC_VCPU_H__ */
> 

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.